Abstract

The number of Internet of Things (IoT) devices is expected to grow exponentially in the near future and produce large amounts of potentially sensitive data. The simple and low cost nature of IoT devices makes them an attractive target for spoofing or impersonation attacks. To solve this issue, this paper proposes a two-factor authentication protocol using physically unclonable functions and the characteristics of the wireless signal from an IoT device. The security analysis and results on MICAz motes shows that the proposed protocol can be used as an effective tool to secure IoT systems from spoofing as well as various other attacks. A performance analysis of the proposed protocol shows that it has a significantly lower computational overhead and energy consumption compared to existing techniques.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call